Exploit the possiblities

Peplink NGxxx/LCxxx VPN-Firewall Open Redirect

Peplink NGxxx/LCxxx VPN-Firewall Open Redirect
Posted Nov 29, 2016
Authored by LiquidWorm | Site zeroscience.mk

Input passed via the '_redirect' GET parameter via 'service.cgi' script on various Peplink VPN-Firewall devices is not properly verified before being used to redirect users. This can be exploited to redirect a user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain.

tags | exploit, arbitrary, cgi
MD5 | 5af9c98feacf1c9f241e8c52fcc8846f

Peplink NGxxx/LCxxx VPN-Firewall Open Redirect

Change Mirror Download

Peplink NGxxx/LCxxx VPN-Firewall Open Redirect Vulnerability


Vendor: Qingdao Xunbo Information Technology Co., Ltd.
Product web page: http://www.peplink.net
Affected version: PEPLINK NG300 VPN-Firewall
PEPLINK NG320-VPN-Firewall
PEPLINK NG500-VPN-Firewall
PEPLINK NG520-VPN-Firewall
PEPLINK LC500-VPN-Firewall

Summary: The NG500 / 520 is a high-performance VPN server, which is suitable
for small and medium enterprises to use as a VPN center. It is simple to deploy
and high security. At the same time, NG500 / 520 products also integrates advanced
firewall features to support access to computers by group, by region, according to
the strategy, according to rules management; support office network and business
network isolation to ensure data server security. At the same time, NG500 / NG520
support intelligent flow control function, can reserve bandwidth for VPN, to ensure
the fluency of critical applications, to prevent network congestion.

The NG300 / 320 products are cost-effective VPN branch gateway products, support to
drive the entire LAN access to the headquarters network to support LAN TO LAN interconnection.
NG300 / 320 integrated online behavior management function, you can achieve P2P, QQ,
MSN and other application control and site filtering and other functions, support QoS
traffic priority control technology, VPN applications can reserve bandwidth to ensure
the stability of remote enterprise data transmission.

Desc: Input passed via the '_redirect' GET parameter via 'service.cgi' script is not
properly verified before being used to redirect users. This can be exploited to redirect
a user to an arbitrary website e.g. when a user clicks a specially crafted link to the
affected script hosted on a trusted domain.

Tested on: nginx/1.2.9
VPN OS 2.6 UTM Base/027R12-newvpn-3.53r
VPNServer/027R12-vpn-b3.74r


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience


Advisory ID: ZSL-2016-5376
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5376.php


24.09.2016

--


GET /service.cgi?_service=get+session&_redirect=http://zeroscience.mk&_sleep=3 HTTP/1.1

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    44 Files
  • 13
    Dec 13th
    25 Files
  • 14
    Dec 14th
    15 Files
  • 15
    Dec 15th
    28 Files
  • 16
    Dec 16th
    3 Files
  • 17
    Dec 17th
    13 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close